Big Dataveillance-Emerging Challenges-David Lyon

Total Page:16

File Type:pdf, Size:1020Kb

Big Dataveillance-Emerging Challenges-David Lyon Big Dataveillance: Emerging Challenges David Lyon, Queen’s University Draft May 3 2016. INTRODUCTION Cynics may say that the only new thing about Big Data is the name. After all, corporations and governments have been gathering big data and searching for patterns for years. But the widespread use of the term, Big Data, itself has catalyzed both corporate celebration and controversial debate, that refuses to die down. Why? Because Big Data practices throw down a gauntlet to many conventional ways of doing things – for example abandoning what were once seen as the rules for statistical analysis, and, when applied, challenging basic aspects of the rule of law. In Big Data Surveillance, it is machines that ‘see’ or ‘watch,’ not passively (as in the panopticon) but predictively. BDS ‘learns’ through correlations and reproduces what was input. Here, we discuss Big Data Surveillance, which has become increasingly important to large organizations and to ordinary people, within today’s digital modernity. The statistical and software practices now gathered together under the often-hyped heading of big data now contribute to a novel surveillance situation for which a good term is ‘Big Dataveillance.’ All major surveillance trends (Bennett et al 2014) are affected by big data. Debating Big Dataveillance is vital because even if we can’t define Big Data it’s clear that rapid developments under that name challenge our conventional capacity to respond. Basic questions are raised beyond individual privacy and rights and indeed beyond specific harms. Big Data Surveillance sharply raises issues about the agents of surveillance and about not merely limiting harms but about seeking the common, public good (van der Sloot, Broeders and Schrijvers 2016). Our lives are made transparent to organizations in ways that are often scarcely visible to us; much Big Data Surveillance is hidden from us. The flows of data are fast and circulate within a broader range of organizations than ever before. Relationships between space and time alter and with them, power relations (Bauman 2000: 9). This aspect of digital modernity is “liquid surveillance,” which has some specific characteristics and is further facilitated by big data. Big data is both highly dynamic and weakly structured, which lends ‘liquidity’ to surveillance (Bauman and Lyon 2013, Lyon 2016). This is a slippery kind of surveillance in both senses. We have less idea of what is happening (Lupton 2015:34) and how it affects our lives and less sense of what, if anything, can be done about it (cf Solove 2013). 1 In the Western world, many discovered big data in September 2013, when a “Snowden document” was released, showing that the NSA tracks the social connections of Americans and others, using a colossal cache of data from phone call and email logs. Their sophisticated graphs of some Americans’ social connections can identify their associates, their locations at certain times, their traveling companions and other personal information (Poitras and Risen 2013). The NSA also “enriches” these data with material from other sources -- public, commercial; things like bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls, location-based services, property records and tax data. All can also be stored for later use. The official reason is to find out who might be directly or indirectly in a contact chain connected with someone of foreign intelligence interest. NSA analysts seek both “person-centric” analyses and “relationship types” that yield “community of interest” profiles. The Snowden leaks show the extent of the use of everyday social media – as well as data sourced from economic transactions, sensors, government and ubiquitous cameras (Michael and Lupton 2015:5, Lyon 2014) -- as the source of actionable data – data that can be captured, assembled, classified and analyzed. These data enable the analytics from which profiles and predictions about us are made, always with a view to enlarging our opportunities or restricting our options. They illustrate the common characteristics of big data – volume, velocity and variety – and also some ‘Vs’ that are less discussed, such as veracity and vulnerability (Saulnier 2016, cf Pasquale 2015). Some starting assumptions: Algorithms and analysis are socially shaped and in turn shape social outcomes. The technologies and practices are bound up with government and corporation, now operating together more closely than ever. Surveillance capitalism is key (Zuboff 2015). So it’s not a ‘society vs technology’ question – Big Data is techno-cultural or socio-technical. And it’s complex; Big Data probably does hold positive promise in some areas. Big Data is not raw or neutral or objective. It is constituted within already-formed- and-emergent commercial, policing, administrative and security assemblages and affect people’s lives accordingly. The primary surveillance questions are ethical. To limit ourselves to legal, technical or administrative issues is inadequate. On the other hand, data subjects are not passive but actually develop various tactics to engage online. 1. BIG DATAVEILLANCE The term ‘big dataveillance’ puts the accent on the kind of surveillance in question. It connects ‘big data’ practices with surveillance done using data trails, something that has been happening since the 1980s using computer data and using “small data” before that. It picks up clues from bits of information left behind 2 every time we log on, make a call, are monitored by sensors or cameras, make a transaction with a bank, another business or a government department. Big dataveillance, like big data generally, is far from any kind of ‘settled’ state; it’s volatile and contested (Michael and Lupton 2015, Kitchin and Lauriault 2015, Clarke 2014). Such chronic volatility, along with its adoption as a key mode of accumulation, may be part of what’s ‘new’ about big dataveillance, beyond the name. Plus, innovations in technology, the widespread use of electronic devices, and massive dependence on technology for social purposes each make real-time information readily available. This occurs in so-called liberal-democratic societies (Bigo and Tsoukala 2008). “Datafication” (Van Dijck 2014) normalizes the process that turns social action into quantified data and allows data to be the currency of exchange between those who want it for business or security purposes and those apparently willing to part with it. As Van Dijck shows, this involves beliefs in big data and trust in its agents. “Life-mining” makes available many aspects of social life not previously accessible by security agencies, corporations or the academy. “Friending” and “liking” become algorithmic relations and the results of tracking them are taken as symptoms or sensors, as ways of knowing what the public is thinking or feeling. But the technological channels are not neutral and the aggregate data do not have a direct relation with individuals whose lives contributed to them. Analysis and projection or deduction and prediction do not have self-evident links (Amoore 2011). At the same time, personalization and customization are central to big data (Andrejevic 2012: 86). “Dataveillance [has] profound consequences for the social contract between corporate platforms and government agencies on the one hand and citizens-consumers on the other” (Van Dijck 2015). Big dataveillance is facilitated by the increasing digitization of everyday life, which in turn relates to the political economy of surveillance, or what Shoshana Zuboff calls “surveillance capitalism” (Zuboff 2015), marked by its dependence on big data. Her study of Google chief economist Hal Varian’s work shows why Google workers, paid or not, experience “studied indifference.” This analysis can be extended to Big Dataveillance. 2. CHANGING PRACTICES New modes of data capture and analytics The sources for data capture have proliferated exponentially -- web data, sensors, internet of things, government data, social media, transactional data plus new analytic paths: streaming, text. Smart and autonomous cars present new issues here! So personally identifiable information is not what it was. What counts, now, is data fragments, an algorithmic assemblage. Excess data- generation has become the norm (and data minimization is viewed as deviant). 3 Reliance on algorithmic modes of data capture and analysis often reinforces discrimination, as several studies indicate (Miller 2015). Google advertising shows ads for high-income jobs are frequently shown more to men than women (Carnegie-Mellon); ads for arrest records show up on searches for distinctively black names (Harvard); advertisers can target people in low income areas with high-interest loans (FTC) (Cf Dwork and Mulligan 2013). The questions pertain to far more than just national security! Especially in mobile contexts, using social media is a new source of intelligence information, not only for corporations seeking new markets but also in national security. This is seen for instance in the LEVITATION disclosures about Canada’s CSE in their search of “radicalized youth” by checking downloads (Gallagher and Greenwald 2015). They did not obtain corporate compliance. The ATOMIC BANJO program taps directly into internet cables and sifts individual IP addresses (cf Forcese and Roach 2015). This happens most obviously in online environments of connectivity. As Van Dijck observes, data culled from social media sites, including so-called “affective” traffic from “like” and “favorite” buttons,
Recommended publications
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) “API-Based Research” or How can Digital Sociology and Journalism Studies Learn from the Facebook and Cambridge Analytica Data Breach Venturini, T.; Rogers, R. DOI 10.1080/21670811.2019.1591927 Publication date 2019 Document Version Accepted author manuscript Published in Digital Journalism Link to publication Citation for published version (APA): Venturini, T., & Rogers, R. (2019). “API-Based Research” or How can Digital Sociology and Journalism Studies Learn from the Facebook and Cambridge Analytica Data Breach. Digital Journalism, 7(4), 532-540. https://doi.org/10.1080/21670811.2019.1591927 General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:28 Sep 2021 “API-based research” or how can digital sociology and journalism studies learn from the Cambridge Analytica affair Tommaso Venturini & Richard Rogers How to cite Venturini, Tommaso, and Richard Rogers.
    [Show full text]
  • Introducing Digital Sociology
    INTRODUCING DIGITAL SOCIOLOGY Deborah Lupton Department of Sociology and Social Policy, University of Sydney 10 July 2013 Acknowledgement: This document is an earlier version of material that will be published as: Lupton, Deborah (forthcoming) Digital sociology. In Germov, John and Poole, Marilyn (eds), Public Sociology: An Introduction to Australian Society. Crows Nest: Allen & Unwin. This book chapter will have additional teaching material added for its final version. The version here presented may be cited as: Lupton, Deborah (2013) Introducing digital sociology. Sydney: University of Sydney. 1 Introduction: the digital age Digital technologies have become central to the lives of most people living in developed countries and increasing numbers of those in the developing world. Since the introduction of personal computers in the early 1980s and the internet in the early 1990s, those technologies – variously referred to as ‘information communication technologies’ (ICTs) or ‘cyber technologies’ and now frequently called ‘digital technologies’ or ‘the new digital media’ – have reached into many dimensions of everyday life, affecting family and intimate relationships, leisure activities, paid work, education, commerce and the ways in which mass media are presented and consumed. New digital media technologies have had a profound influence on everyday life and social relations for many people in developed societies, and increasingly in developing societies. People across the globe have becoming linked together by digital media and networks
    [Show full text]
  • Visual Social Media and Big Data. Interpreting Instagram Images Posted on Twitter
    Visual Social Media and Big Data Interpreting Instagram Images Posted on Twitter Dhiraj Murthy, Alexander Gross, Marisa McGarry Abstract Social media such as Twitter and Instagram are fast, free, and multi- cast. These attributes make them particularly useful for crisis commu- nication. However, the speed and volume also make them challenging to study. Historically, journalists controlled what/how images repre- sented crises. Large volumes of social media can change the politics of representing disasters. However, methodologically, it is challenging to study visual social media data. Specifically, the process is usually labour-intensive, using human coding of images to discern themes and subjects. For this reason, Studies investigating social media during crises tend to examine text. In addition, application programming interfaces (APIs) for visual social media services such as Instagram and Snapchat are restrictive or even non-existent. Our work uses images posted by Instagram users on Twitter during Hurricane Sandy as a case study. This particular case is unique as it is perhaps the first US disaster where Instagram played a key role in how victims experi- enced Sandy. It is also the last major US disaster to take place before Instagram images were removed from Twitter feeds. Our sample con- sists of 11,964 Instagram images embedded into tweets during a two- week timeline surrounding Hurricane Sandy. We found that the pro- duction and consumption of selfies, food/drink, pets, and humorous macro images highlight possible changes in the politics of representing disasters – a potential turn from top-down understandings of disas- ters to bottom-up, citizen informed views.
    [Show full text]
  • Globalisation and the Digital World Version 3
    Qualification Accredited A LEVEL Delivery Guide SOCIOLOGY H580 For first teaching in 2015 Theme: Globalisation and the digital world Version 3 www.ocr.org.uk/sociology A LEVEL SOCIOLOGY CONTENTS Introduction Page 3 Curriculum Content Page 4 Thinking conceptually Page 6 Thinking contextually: activities Page 8 Thinking contextually: suggested answers to student resource sheets 1, 2, 4, 5 and 7 Page 25 References Page 34 2 Introduction Delivery guides are designed to represent a body of knowledge about teaching a particular topic and contain: • Content: A clear outline of the content covered by the delivery guide; • Thinking Conceptually: Expert guidance on the key concepts involved, common difficulties students may have, approaches to teaching that can help students understand these concepts and how this topic links conceptually to other areas of the subject; • Thinking Contextually: A range of suggested teaching activities using a variety of themes so that different activities can be selected which best suit particular classes, learning styles or teaching approaches. If you have any feedback on this Delivery Guide or suggestions for other resources you would like OCR to develop, please email [email protected]. 3 Curriculum Content This delivery guide focuses on introducing learners to the • Learners should explore the issue of access to digital Component 3 theme of globalisation which runs through communication locally and globally as well as patterns both compulsory and option topics. This compulsory section, of access and use. This can be done by considering the globalisation and the digital social world, focuses on two key concept of social capital, as well as considering the response questions: of the state in regulating and managing such new forms of communication • Learners should develop an understanding of the impact 1.
    [Show full text]
  • After the 'Apicalypse': Social Media Platforms and Their Fight Against Critical Scholarly Research
    After the ‘APIcalypse’: Social Media Platforms and Their Fight against Critical Scholarly Research AXEL BRUNS DIGITAL MEDIA RESEARCH CENTRE QUEENSLAND UNIVERSITY OF TECHNOLOGY BRISBANE, AUSTRALIA [email protected] – @SNURB_DOT_INFO 1 After the ‘APIcalypse’: Social Media Platforms and Their Fight against Critical Scholarly Research Abstract In the aftermath of the Cambridge Analytica controversy, social media platform providers such as Facebook and Twitter have severely restricted access to platform data via their Application Programming Interfaces (APIs). This has had a particularly critical effect on the ability of social media researchers to investigate phenomena such as abuse, hate speech, trolling, and disinformation campaigns, and to hold the platforms to account for the role that their affordances and policies might play in facilitating such dysfunction. Alternative data access frameworks, such as Facebook’s partnership with the controversial Social Science One initiative, represent an insufficient replacement for fully functional APIs, and the platform providers’ actions in responding to the Cambridge Analytica scandal raise suspicions that they have instrumentalised it to actively frustrate critical, independent, public interest scrutiny by scholars. Building on a critical review of Facebook’s public statements through its own platforms and the mainstream media, and of the scholarly responses these have drawn, this article outlines the societal implications of the ‘APIcalypse’, and reviews potential options for scholars in responding to it. Keywords Cambridge Analytica, Social Science One, Facebook, Twitter, Application Programming Interface, API, social media, big data Introduction: End of an Era The face of scholarly social media research is changing, rapidly. For the past ten years or so – since Facebook’s userbase began to grow rapidly in 2008, and Twitter’s followed suit in 2009 – there had been a steady growth in the field, in methodological, theoretical, empirical, and organisational terms (see e.g.
    [Show full text]
  • New Media As a Formation Factor for Digital Sociology: the Consequences of the Networking in the Society and the Intellectualization of the Communications
    Studies of Changing Societies: Comparative and Interdisciplinary Focus Vol. 3'(7)2013 SCS 3'(7)2013:67-106 SCS Journal NEW MEDIA AS A FORMATION FACTOR FOR DIGITAL SOCIOLOGY: THE CONSEQUENCES OF THE NETWORKING IN THE SOCIETY AND THE INTELLECTUALIZATION OF THE COMMUNICATIONS © Olga Kyslova Associate Professor of the Department of Sociological Research Methods, Sociological Faculty, .N.Karazin Kharkiv National University), Ukraine © Ekateryna Berdnyk (Postgraduate Student of the Department of Sociological Research Methods, Sociological Faculty, Karazin V. N. Kharkiv National University) Ukraine The perspectives of digital sociology formation through the prism of transformation of new media are considered in the article. We confirm the beginning of the age of intelligent media, which incorporate the network principle of organization of the interactions with the implementations of artifacts (artificial intelligent agents) to communication processes and are the base for the formation of digital environment for human life. Among the main socio-cultural effects of the development of new media we rank the expansion of social reality due to the addition of a “digital dimension” to it, the formation of network culture and actualization of the communicative (and subsequently, network and digital) subjectivity. We consider the network culture from the point of view of the activity approach and define it as a conglomerate of stationary value and normative mechanisms, technological means of implementation and results of network communications. We consider the network culture formation to be a result of the societal networking and it serves as the basis for DOI: 10.2478/scs-2014-0154 © SCS Journal. All rights reserved 67 Studies of Changing Societies: Comparative and Interdisciplinary Focus Vol.
    [Show full text]
  • Public Sociology on Twitter: a Space for Public Pedagogy?
    Am Soc (2017) 48:233–245 DOI 10.1007/s12108-016-9304-2 Public Sociology on Twitter: a Space for Public Pedagogy? Christopher J. Schneider1 & Deana Simonetto2 Published online: 27 February 2016 # Springer Science+Business Media New York 2016 Abstract Research has examined various elements of Twitter; however, no scholarship has explored how sociologists currently use the platform. This empirically driven paper explores how individuals that self-identify as sociologists on Twitter use the popular micro-blogging social media site. A total of 152,977 tweets from Twitter profiles of 130 sociologists were collected and examined using qualitative media analysis. The poten- tial use of Twitter allows the sociologist to become both the generator and interlocutor of dialogue with publics. We frame our data analysis and discussion around the core theme of expertise - namely, the role that expertise plays in the use of Twitter by sociologists. Our findings indicate that when sociologists used Twitter as sociologists (i.e., drawing upon their stated research expertise) little direct engagement with publics occurred. Thus, while sociologists appear to be using Twitter as a space for public sociology, the use of this interactive platform is mostly limited to the generation of content, a finding consistent with Burawoy’s traditional form of public sociology. Suggestions for future research are noted. Keywords Public sociology. Twitter . Social media Introduction The practice of pedagogy is often viewed in a rather narrow way that is limited to the role that intellectuals play within academia (Giroux 2004). Facilitating dialogue that * Christopher J. Schneider [email protected] Deana Simonetto [email protected] 1 Department of Sociology, Brandon University, Brandon, MB, Canada 2 Department of Sociology, McMaster University, Hamilton, ON, Canada 234 Am Soc (2017) 48:233–245 transcends formal institutions of teaching and learning is a basic feature of public pedagogy (Giroux 2000).
    [Show full text]
  • For Digital Methods
    NMS0010.1177/1461444818769236new media & societyVenturini et al. 769236research-article2018 Article new media & society 1 –23 A reality check(list) for © The Author(s) 2018 Reprints and permissions: digital methods sagepub.co.uk/journalsPermissions.nav https://doi.org/10.1177/1461444818769236DOI: 10.1177/1461444818769236 journals.sagepub.com/home/nms Tommaso Venturini University of Lyon, Lyon, France Liliana Bounegru Ghent University, Belgium; University of Groningen, The Netherlands Jonathan Gray King’s College London, UK Richard Rogers University of Amsterdam, The Netherlands Abstract Digital Methods can be defined as the repurposing of the inscriptions generated by digital media for the study of collective phenomena. The strength of these methods comes from their capacity to take advantage of the data and computational capacities of online platforms; their weakness comes from the difficulty to separate the phenomena that they investigate from the features of the media in which they manifest (‘the medium is the message’, according to McLuhan’s 1964 dictum). In this article, we discuss various methodological difficulties deriving from the lack of separation between medium and message and propose eight practical precautions to deal with it. Keywords Computational social sciences, digital methods, digital sociology, methodology, operationalisation Corresponding author: Tommaso Venturini, 25 rue des Envierges, 75020 Paris, France. Email: [email protected] 2 new media & society 00(0) Big data, big infrastructures Great expectations and great concerns have been raised about ‘big data’ (Boyd and Crawford, 2012), ‘data science’ (O’Neil and Schutt, 2013) and the ‘computational social sciences’ (Lazer et al., 2009). A rumbling storm of digital traces is said to loom over the humanities and the social sciences, bringing great power and also responsibilities.
    [Show full text]
  • EU Safe Harbor Framework and Beyond Abstract Introduction
    On the life and lives of digital data: The US - EU safe harbor framework and beyond by Katarina Rebello This work is licensed under a Creative Commons Attribution 3.0 License. Abstract Digital data is entangled in a variety of intersecting discourses and debates- from narratives about ‘big data revolutions’ and ‘open data movements’ to controversies surrounding security and surveillance practices as well as divisive questions about privacy and data protection as social and legal principles. This article will unpack digital data from a security perspective within the context of the Safe Harbor Framework, a governance arrangement designed to facilitate digital data flows between the United States and the European Union. The driving focus of this article is best defined through several interrelated questions, namely: What is digital data? How is it possible for digital data to be constructed in overlapping and contested ways? And what does the development and deterioration of the Safe Harbor Framework reveal about the nature of digital data in the contemporary world? This article proposes that digital data is ‘alive’ and has many ‘lives’- simultaneously constructed as a ‘mundane’ feature of everyday life, as a component of ‘security-enhancing’ strategies, and as a ‘security threat’. Keywords: Big Data, Data Protection, Open Data, Privacy, Security, Surveillance, Transatlantic Introduction Digital data represents the sum of information generated through actions and interactions on the Internet- encompassing everything from emailing and instant messaging to video streaming, online banking, and social networking (Gralla, 2007, p.13). The information generated through these increasingly diverse online activities is converted and stored as digital data using a numerical system of binary code, commonly represented by assorted sequences of 0’s and 1’s (Lupton, 2015, p.8).
    [Show full text]
  • Digital Sociology and Society Professor
    SOC 270: Digital Sociology and Society Professor: Dr. Tressie McMillan Cottom Course Description Digital media, platforms and connections continue to shape our social world. This course will cover the sociological underpinnings of our apps, likes, shares, profiles and swipes. Many of the digital tools we use have become critical points of access for education, healthcare, government and work. And, not all groups have the same access to, experience of, and returns to using these tools. Given that, digital sociology is emerging from classic social theory and methods to consider these new technologies and how we interact with them. This course will put new/digital/social media in its broader social context. That means we will study institutions, people and groups through these tools rather than studying tools as an ends unto themselves. We will primarily take a critical perspective to 1) labor and new media 2) surveillance and privacy on social media networks and 3) contemporary issues of digital technologies and stratification by race, class, gender, and citizenship. Required Texts Lupton, Deborah. 2014. Digital Sociology. Routledge. ISBN: 978-1138022775 Online Resources SociologyConcepts is an online resource that explains sociological concepts. SocCinema is an online resource that explores sociological concepts through popular media and film. SocImages is another online resource that explores sociological concepts through images and pictures, many from pop culture. Assignments Writing assignments are a sociological practice. Given the nature and content of this course we will define both writing and assignments broadly. The three reflection papers and one final project are designed to prompt critical reflection of how new media and social media are reshaping critical social processes.
    [Show full text]
  • Visual Social Media and Big Data Interpreting Instagram Images Posted on Twitter
    Visual Social Media and Big Data Interpreting Instagram Images Posted on Twitter Dhiraj Murthy, Alexander Gross, Marisa McGarry Abstract Social media such as Twitter and Instagram are fast, free, and multi- cast. These attributes make them particularly useful for crisis commu- nication. However, the speed and volume also make them challenging to study. Historically, journalists controlled what/how images repre- sented crises. Large volumes of social media can change the politics of representing disasters. However, methodologically, it is challenging to study visual social media data. Specifically, the process is usually labour-intensive, using human coding of images to discern themes and subjects. For this reason, Studies investigating social media during crises tend to examine text. In addition, application programming interfaces (APIs) for visual social media services such as Instagram and Snapchat are restrictive or even non-existent. Our work uses images posted by Instagram users on Twitter during Hurricane Sandy as a case study. This particular case is unique as it is perhaps the first US disaster where Instagram played a key role in how victims experi- enced Sandy. It is also the last major US disaster to take place before Instagram images were removed from Twitter feeds. Our sample con- sists of 11,964 Instagram images embedded into tweets during a two- week timeline surrounding Hurricane Sandy. We found that the pro- duction and consumption of selfies, food/drink, pets, and humorous macro images highlight possible changes in the politics of representing disasters – a potential turn from top-down understandings of disas- ters to bottom-up, citizen informed views.
    [Show full text]
  • Towards an Ethical Framework for Using Social Media Data in Social Research
    SOC0010.1177/0038038517708140SociologyWilliams et al. 708140research-article2017 Article Sociology 1 –20 Towards an Ethical © The Author(s) 2017 Framework for Publishing Reprints and permissions: Twitter Data in Social sagepub.co.uk/journalsPermissions.nav https://doi.org/10.1177/0038038517708140DOI: 10.1177/0038038517708140 Research: Taking into journals.sagepub.com/home/soc Account Users’ Views, Online Context and Algorithmic Estimation Matthew L Williams Cardiff University, UK Pete Burnap Cardiff University, UK Luke Sloan Cardiff University, UK Abstract New and emerging forms of data, including posts harvested from social media sites such as Twitter, have become part of the sociologist’s data diet. In particular, some researchers see an advantage in the perceived ‘public’ nature of Twitter posts, representing them in publications without seeking informed consent. While such practice may not be at odds with Twitter’s terms of service, we argue there is a need to interpret these through the lens of social science research methods that imply a more reflexive ethical approach than provided in ‘legal’ accounts of the permissible use of these data in research publications. To challenge some existing practice in Twitter-based research, this article brings to the fore: (1) views of Twitter users through analysis of online survey data; (2) the effect of context collapse and online disinhibition on the behaviours of users; and (3) the publication of identifiable sensitive classifications derived from algorithms. Keywords algorithms, computational social science, context collapse, ethics, social data science, social media, Twitter Corresponding author: Matthew L Williams, Social Data Science Lab, School of Social Sciences, Cardiff University, Glamorgan Building, King Edward VII Ave, Cardiff CF10 3WT, UK.
    [Show full text]